It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 19.10 | |
ubuntu_linux | eq | 20.04 | |
fedora | eq | 31 | |
fedora | eq | 32 | |
libvncserver | lt | 0.9.12 | |
leap | eq | 15.1 | |
leap | eq | 15.2 | |
simatic_itc1500_firmware | ge | 3.0.0.0 |
lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html
www.openwall.com/lists/oss-security/2020/06/30/3
bugzilla.redhat.com/show_bug.cgi?id=1852356
cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433
lists.fedoraproject.org/archives/list/[email protected]/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/
lists.fedoraproject.org/archives/list/[email protected]/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/
usn.ubuntu.com/4407-1/
www.openwall.com/lists/oss-security/2020/06/30/2